Daily Tech Digest - January 09, 2017

Compare benefits of a blade server architecture vs. hyper-convergence

While traditional storage required large arrays of hard drives to achieve adequate performance, today's SSD-based appliances are typically just 8 to 12 SSDs, including a commercial-off-the-shelf controller that is essentially identical to a server motherboard. The key distinguisher between hyper-converged infrastructure and a blade server architecture is that in hyper-converged systems, the storage is networked and then pooled to create a huge virtual SAN. New innovations such as software-defined infrastructure take this further, to the point that the storage pool and the networks connecting the appliances are virtualized and controlled automatically by orchestration software. This allows tenants of an HCI-based cloud to add and subtract to their configurations using scripts and policies, without central IT intervention.


New York gets smarter, one tech trial at a time (with video)

Smart city technology beta projects and pilot programs are gaining ground in New York City. Walk around the Big Apple, as Computerworld did recently, and you encounter everything from free public Wi-Fi to smart park benches and even sophisticated listening devices that can detect gunshots to allow a quick police response. Much of this wide-ranging tech focus goes back to 2014 when Mayor Bill de Blasio appointed the city's first Chief Technology Officer. He picked private sector tech veteran Minerva Tantoco for the role. During her tenure, she made a practice of pushing for small tech trials that could be modified and adjusted before being expanded. "Taking a page from the CTO playbook is the concept of using pilots and prototypes," Tantoco said in a video interview with Computerworld recorded at City Hall in June of 2016.


Why machine learning will decide which IoT ‘things’ survive

For a computer to reliably study patterns, the data set needs to be enormous. It needs to consider a multitude of factors, ranging from user preference to use cases, environment, and much more. But many or even most of these factors are time-dependent: frequency of use, frequency of behaviors, frequency of conditions, changes to user behavior over time, seasonal changes to the environment, data accuracy over the lifespan of the sensor, etc. Time is doled out democratically; a hundred million devices on solid connections won’t make a company’s clock turn faster. A six-month lead on a competitor can’t be closed with more users or funding. Your data will be fundamentally better than theirs, shown in the accuracy of your readings, and the number of features you support as earlier features become reliable enough to finalize and ship.


Are you ready for a state-sponsored cyber attack?

Geopolitical tensions ensure that 2017 will be another big year for state-sponsored cyber attacks. The lethality of state-sponsored attacks derives from their ability to bypass security point products by combining device, network and data center vulnerabilities into an integrated assault. Another aspect of state-sponsored cyber attacks is their willingness to patiently creep from organization to organization to get to their target. Irrespective of the lethality of state-sponsored cyber attacks, it is a mistake to think that there is no way to stop them. If your organization has something of value to a foreign government here are five cyber attack counter-measures you should be implementing.


15 of the coolest wired and wireless earbuds we saw at CES

Earbuds may never give you the rich, immersive audio-gasmic experience that a nice pair of open-back, over-ear headphones can offer—but so what? You don’t use earbuds to get lost in the nuances of music. You use them because they’re small, durable, convenient, and because over-ear headphones get super-sweaty if you try to wear them while you’re working out. But earbuds—especially wireless and “truly wireless” earbuds (thanks a lot, Apple AirPods)—are trickier than headphones, because something that goes inside your ear isn’t as universal, fit-wise, as something that covers your ear. So it’s no surprise that CES 2017 is awash with earbuds in all sizes and shapes, and with and without wires. Take a look at the coolest earbuds we saw on this year’s show floor.


Dangerous Assumptions That Put Enterprises At Risk

On the surface many of the assumptions people make don't seem too dangerous, but they can lead to a breach. The survey found that a third of organizations fail to take any type of preventative action because they think they won’t be affected by these attacks. In reality, Pozhogin said, "Any company can be targeted by a DDoS attack at any time, especially since these attacks are easy for cybercriminals to launch. It’s not a matter of if it will happen, but when it will happen." ... Depending on how a company states the complexity of its password policy, it could be handing out clues to hackers. "They assume that password complexity keeps them safer, but if they state that every password must begin with a digit and have five letters, they’re giving the hackers a hint about what should be the first key of a password," Kotler said.


Cyber risks to intensify in 2017

With cybersecurity firmly entrenched as one of the most consequential issues impacting international security, politics, economic stability and transactional crime, an understanding of existing and emerging cyber risks is more relevant than ever before. Stroz Friedberg’s predictions outline the top cybersecurity threats facing businesses and provide recommendations on how organisations can increase their resilience in the face of these threats. “In 2016 we witnessed everything from cyber attacks influencing public opinion to hacked IoT devices and the introduction of new cybersecurity regulations. This year we’ll see an intensification of these threats, along with new challenges and a blurring of lines between the actions and responsibilities of the state, markets, businesses and civil society,” said Ed Stroz, Co-President and Co-Founder of Stroz Friedberg.


Why Biometric Technology Is Still Not the Absolute Replacement for Passwords

Last year it was reported that in a United States Office of Human Resource Management, touch ID’s of millions of government employees were stolen which first raised the suspicion on the tech. Immediately ascertaining the threat, the mobile companies quickly altered the fingerprint system in the devices by adding a password security succeeding the touch ID. This data breach made it clear that biometrics is not impeccable. In fact they have simply shunned the passwords. Counting it can get very problematic if someone cannot log in with his or her touch ID, all the software companies ranging from Microsoft’s Windows 10 and Google’s Android have provided password tool as well to ensure this does not happen. So, relying on biometric authentication is not recommended at the current time as having a backup in the form of passwords is very important.


Everything is a virtual assistant now

Unlike the Whirlpool refrigerator, which can be minimally controlled by Alexa commands, LG announced a fridge that actually functions as an Alexa device. The LG Smart InstaView fridge has a camera inside so you can check what you need while you're at the store, and also a screen on the outside. The screen is interesting: By tapping on the screen twice, it becomes a transparent window so you can see what's inside without opening the door. Gadget fans will also be intrigued by the operating system that powers some of the smart features: It's WebOS!  Chinese smartphone giant Huawei announced at CES that its $599.99 Mate 9 phablet would become the first smartphone to ship with Alexa integration pre-installed and integrated. While Alexa is available in a smattering of mobile apps for both Android and iOS platforms, the Huawei integration appears to offer "always-listening" hands-free access to Alexa.


The Best Strategic Leaders Balance Agility and Consistency

The best performers are, of course, consistent. Consistent leaders work hard and show up on time. They set goals for themselves and their employees and they achieve them. They plan diligently and produce excellent products and experiences for clients time and time again. They are diligent and possess resilience and grit. Consumers expect consistent products; people appreciate consistent management. But if organizational leaders are merely consistent, they risk rigidity. In changing environments, they can struggle to adapt and may cling to old habits and practices until those practices become counterproductive, distracting them from the more important new work that needs to be done. On the other side of the spectrum, great leaders are agile. Markets demand that companies and people adapt and change constantly.



Quote for the day:


"Enthusiasm is the greatest asset in the world. It beats money, power and influence." -- Henry Chester


Daily Tech Digest - January 08, 2017

The Fourth Industrial Revolution disrupted democracy. What comes next?

ICT played a key role in 2016, and it is clear that the Fourth Industrial Revolution will continue to drive politics and industry. Leaders should interpret the events of last year as a sign that communications have been truly democratized. The technology that allowed electorates to organize and coordinate in unforeseen ways to determine the fate of an economic union, as well as the impeachment or selection of the next leader, is affecting other areas of society in as yet unforeseen and unexpected ways. ... At this year's Davos, the theme of “Responsive and Responsible Leadership” is a good opportunity to talk about this new context. It’s the start of a new era and the birth of new communication controlled by the many, not the few.


SWIFT Speaks On Fraudulent Messages And The Security Moves 

The SWIFT cooperative is taking other steps to help secure the wider community. To support the community in sharing cyber-threat information, SWIFT has put a forensics team in place that works with clients to retrieve information about any SWIFT-related security incidents to support their security efforts. Whether a transaction has been blocked, or processed, without the movement of funds, or if hackers compromise a bank successfully, the forensics team helps customers with their investigations, and shares that information in an anonymized form with the wider community through SWIFT’s security notification process, explains Antonacci. “When we become aware of a new modus operandi or indicator of compromise, whether through local ISACs, CERTs, local agencies, or our customers, we anonymize the data so that customers are comfortable sharing it and we, in turn, share it with the entire community,” says Antonacci.


How voice technology is transforming computing

This is a huge shift. Simple though it may seem, voice has the power to transform computing, by providing a natural means of interaction. Windows, icons and menus, and then touchscreens, were welcomed as more intuitive ways to deal with computers than entering complex keyboard commands. But being able to talk to computers abolishes the need for the abstraction of a “user interface” at all. Just as mobile phones were more than existing phones without wires, and cars were more than carriages without horses, so computers without screens and keyboards have the potential to be more useful, powerful and ubiquitous than people can imagine today. Voice will not wholly replace other forms of input and output. Sometimes it will remain more convenient to converse with a machine by typing rather than talking


Blockchain: Unravel the Unrevealed

We are managing our organizations in a traditional way, but we are trying to adapt this new technology, where we don’t know whether Blockchain would be beneficial for our main business lines or not. Automatic control and automating operations are not the same. But in both cases it needs experience in modeling and running parallel systems. It is necessary before declaring that the firm/ organization will change from conventional to the newest. Firms can start with parallel processing approach, where both the traditional and Blockchain method will be used. Following which, firms can slowly move their business lines in succession to Blockchain technology, and comply with the ecosystem. This would help firms to leverage the dual benefits of speed and security without hampering the current management process. The only thing that firms needs to figure out the costs of Investment.


Beyond Robo-Advisers: How AI Could Rewire Wealth Management

"There's information out there that is highly correlated to stock return, bond return and market return," said Jody Kochansky, head of the Aladdin product group at BlackRock. "We believe that the firms that can get organized around their data, understand and are able to research what all those data are telling them and predicting can ultimately invest in a way to create better returns for clients." Aladdin, which is based on open source technology and Hadoop, uses natural-language processing to read thousands of documents, including news stories and broker reports, and comes up with a sentiment score on the entities or companies the articles mention. Social media feeds give Aladdin insight into news events. If people tweet photos of a fire that broke out near a gas pipeline, that could cause a scare 45 minutes later in the energy market, for instance.


Time for a Blockchain Digital Currency, Says Indian Central Bank’s Research Arm

In a significant endorsement of blockchain technology, bitcoin’s underlying innovation, the research arm of the Reserve Bank of India (RBI) – India’s central bank – has tested blockchain solutions for core banking processes in the country. More notably, researchers have determined that blockchain technology has “matured enough” to be the core technology to support the digitization of India’s fiat currency, the rupee. Established by the central bank, the Institute for Development & Research in Banking Technology (IDRBT) is the research arm of the RBI and the foremost banking research institute in the country. ...  A blockchain proof-of-concept (PoC) was developed and implemented in a trade finance application involving regulators and banks.


Using data science to beat cancer

The good news is that big data’s role in cancer research is now at center stage, and a number of large-scale, government-led sequencing initiatives are moving forward. Those include the U.S. Department of Veteran Affairs’ Million Veteran Program; the 100,000 Genomes Project in the U.K.; and the NIH’s The Cancer Genome Atlas, which holds data from more than 11,000 patients and is open to researchers everywhere to analyze via the cloud. According to a recent study, as many as 2 billion human genomes could be sequenced by 2025. There are other trends driving demand for fresh data, including genetic testing. In 2007, sequencing one person’s genome cost $10 million. Today you can get this done for less than $1,000. In other words, for every person sequenced 10 years ago, we can now do 10,000.


Internet Of Things (IoT) Outlook For 2017

5G is the panacea, supposedly. 5G, however, is many years from being realized in any meaningful way driving telcos to have to deal with new IoT models using alternative technologies today. Telecom operators’ strategies and business models for generating revenues from IoT will continue to develop through 2017—and won’t be set by this time next year. For telcos, we’ll continue to see the battle between NB-IoT and LTE-M play out based on region and monetization models through 2017. Infrastructure providers such as Ericsson and Huawei will continue to increase in importance, providing strong portfolios of IoT hardware and software solutions that everyone needs. Alternative LPWAN technologies will become increasingly strong in niches where the bandwidth, capacity and security of 3GPP standards aren’t necessary (or cost affective). 


Technology is changing the way we live, learn and work. How can leaders make sure we all prosper?

Of course, spreading the benefits from technology demands leadership from governments, too – in areas like education, infrastructure, regulations, taxes and social protection – as well as individuals taking responsibility for developing their skills. But these are great examples of how leadership in the private sector can help to shape the way technology remakes society. The changes won’t happen overnight. In the first industrial revolution, it took several decades after the invention of the steam engine for societal changes to play out. After electricity became widely available, it still took about another three decades for industrialists to fully rethink their factories, business models and organisational structures to take advantage. Similarly, the social impacts of many of today’s emerging technologies are likely to take several decades to shake out – from self-driving cars to healthcare to manufacturing to financial services.


IT Service Providers Increase Investment In Onshore Locations

Onshore centers offer easier coordination with clients. “It is also possible to meet the client often to maintain alignment, or to seek or complete training on a domain or function,” explains Srivastava. “All these are more difficult to do when located remotely offshore or nearshore. Travel is expensive and time zone differences are a barrier to real-time communication.” In addition, some lower cost tier two cities have gained credibility with providers. “Smaller cities, especially in North America and Europe, are gaining maturity as service delivery destinations,” Srivastava says. “This has led to a diversifying talent pool, thus enabling faster growth of existing and new companies.” In some instances, new data security regulations mandate that data hosting and processing onshore for some clients.



Quote for the day:


"When you do things from your soul, you feel a river moving in you, a joy." -- Rumi


Daily Tech Digest - January 07, 2017

Three insights to make Agile development work for you

Instead of organising development over a long series of phases, Agile methods break development into an integrated series of chunks. Each team works from planning to testing an aspect of development in a short period of time before moving on to the next ‘chunk’. By rapidly moving between iterations, a project can remain adaptive to changes in requirements that would otherwise derail the entire endeavour. A further consideration is the effect that Agile and Waterfall have on the people who use them. Human beings enjoy working together, and even those who don’t have to admit that they get a lot more achieved when then do. Unlike Waterfall methods, Agile emphasises the importance of increasing efficiency through more collaboration, empowerment of developers and fostering a culture of continuous improvement.


Google Moves Into Augmented Reality Shopping With BMW, Gap

With Google, BMW is testing a new app that displays an i3 city vehicle and i8 sports car on smartphone screens. Car shoppers can walk around the superimposed vehicles, placing it to look life-size inside their driveway or garage. Users can choose from six different colors, four types of trims and wheels, all appearing in a high-resolution image. The Munich-based luxury automaker said the mobile app will be available at dealerships in 11 countries. “It’s possible we’ll develop a kind of library of models for this app,” said Stefan Biermann, head of innovations for sales for BMW. At a recent presentation in Munich, the display image of an i3, even on a small phone screen, was convincing enough for users to duck and lift their legs to step inside the vehicle, where they could push a button to turn on the lights and the radio.


Why France’s new ‘right to disconnect’ law matters

The disconnection law was included in a package of comprehensive labor reforms that make it easier to reduce pay and cut workers. Thousands took to the streets in France this past summer to protest it. "Because this law was very difficult to accept in France, a lot of goodies have been added in it," said France-based OpenVMS consultant Gerard Calliet. Those goodies include the disconnect law. For Calliet, disconnecting is not an option as far as his client work is concerned. France changed its labor laws to help lower its 10% unemployment rate. But James W. Gabberty, associate dean and professor of information systems at Pace University in New York, says the email rule will only erode productivity.


Interview with Entity Modelling Tool Creator, Frans Bouma

Every ORM has its unique set of features and a set of common features. One of the most prominent differences between LLBLGen Pro Runtime Framework and all the others is that it does the change tracking inside the entity class instances and therefore doesn't need a central context or session object (the old Scott Ambler design of an ORM). Doing the change tracking inside the entity itself has many advantages, one being that you can have a stand-alone unit of work object. This allows you to track work and changes to the in-memory entity graph with the stand-alone unit of work object which you can then pass to the persistence core. That will have no problem determining what you want: there's no conflict about whether these entities are new, updated or e.g. you want them deleted, that information is inside the unit of work and the entities.


Fintech in 2017: Automation Will Rule

When considering the automation opportunities offered through AI, many banks have identified onboarding and know-your-customer processes as the priority area. New advancements in technology now let banks deliver a more frictionless experience by allowing customers to easily upload documents through their mobile camera and extract both the needed data fields and intent of documents to automate the credit decision process rather than have to deal with filling in paperwork. More affordable and extensive processing power, general availability of algorithms through algo "marketplaces" and colossal data sets to feed the algorithms have also combined to unleash a new era of Robotic Process Automation. In 2017, RPA will become a key priority for bank executives looking to do more with less.


Public and private initiatives converge with Singapore’s digital community

“I know it’s a big word, digital economy means different things to different people.” Lim envisions Singapore and his role as regulator as serving two functions, for both native and foreign businesses: “Singapore works because it is a node to the region, our market is too small, we have to serve the broader region.” To that end, the business environment needs to help not only native businesses but entrepreneurs and companies coming into the country to get a foothold in the Southeast Asian market. “We want to be in that position for a long time to come,” says Lim, adding that the labour market is quite open for people to come in as Singapore isn’t immune to skills shortages either. Perhaps this is why the country has taken a rather proactive approach in trialling new technology to get a feel for what might actually work.


What 2017 holds for enterprise software

“The modern BI platform is designed for the end user,” says Francois Ajenstat, chief product officer, Tableau Software. “It’s intuitive and enables self-service. This is in contrast to traditional BI platforms that needed a specialist in IT to be able to run.” “The biggest trend within BI will be that it becomes far easier to use for the average person,” says Murray Ferguson, director, Pro-Sapien Software. “We have already seen this taking shape, for example, in Microsoft’s Power BI software. The ability to ask questions (both spoken and typed) to find the desired results, as opposed to more technical SQL requests, is also coming. [And] anyone [will be able to] run reports and pull data as opposed to someone skilled in running SQL queries. For example, [users will be able to] type or speak ‘show all open tickets’ [and the software] will display the results.”


Fundamentals of Image Processing - behind the scenes

Image processing algorithms have became very popular in the last 20 years, which is mainly due to the fast extension of digital photography techniques. Nowadays, digital cameras are so common that we even do not notice them in our daily life. We are all recorded in the subway, airports, highways - image processing algorithms analyze our faces, check our behavior, detect our plates and notice that we left our luggage. Moreover, most of us were using image processing algorithms in software like Photoshop or GIMP. To receive interesting artistic effects. But, however advanced these algorithms would be, they still rely on fundamentals. In this article we are going to present the basic image processing algorithms that will help to understand what does our graphics editor software calculates behind the scenes.


Microsoft’s OS supremacy over Apple to end in 2017

In 2017, Apple's combination of iOS and macOS -- the former on iPhones and iPads, the latter on Macs -- will take second place from Windows on the devices shipped during the year. The gap between the two will widen in 2018 and 2019, with Apple ahead of Microsoft both years. According to Gartner, which provided Computerworld with its latest device shipment forecast broken out by operating system, in 2016 Windows powered about 260 million devices of the 2.3 billion shipped during the year. Windows accounted for approximately 11.2% of the total devices, which overwhelmingly ran Google's Android. Meanwhile, iOS and macOS -- the latter was formerly dubbed OS X -- sank to 248 million devices in 2016, a 10% drop from the year prior. The cause: Slackened sales of the iPhone, Apple's dominant device and biggest money maker.


Is your mobile strategy ready for Industry 4.0?

Enterprises are at a crossroads where they will have to decide what OS they want when refreshing their fleets of mobile devices. Over the last decade, the most popular and widely deployed OS for enterprise mobile devices have been Microsoft’s Windows CE and Windows Embedded Handheld (WEH) 6.5, and Microsoft will end mainstream support for these embedded OS by 2020. In addition, migrating to the next generation platform will require significant lead time to ensure smooth migration without disruptions to operations, as Microsoft will not offer backward compatibility for its earlier mobile OS . It is more critical than ever for decision-makers to make a choice that will shape the way their organizations will operate in the next three to five years. They could stay with Windows, migrate to Android, or look to Apple and its iOS. But whichever they choose, the new generation OS has to be flexible, intuitive and adaptable.



Quote for the day:


"As a small businessperson, you have no greater leverage than the truth." -- John Whittier


Daily Tech Digest - January 06, 2017

2017: The year of cybersecurity scale

Forget about centralizing all cybersecurity data because it is no longer feasible to do so. Enterprise cybersecurity professionals must learn all they can about distributed data management architecture and include cloud-based elements to all their planning. Enterprise customers have already placed SIEM vendors such as AlienVault, IBM, LogRhythm and Splunk on a data management treadmill to keep up with scale, but these vendors will be forced to innovate rapidly, tier their storage backends and provide cloud-based services for non-critical and archival data. Cybersecurity professionals will need to understand an array of data management technologies – relational databases, NoSQL, Hadoop/HDFS, etc. – and figure out what goes where and how to keep track of it all. Finally, companies like Amazon, Facebook, Google and Microsoft familiar with cloud-scale data challenges may play a role in new types of cybersecurity data management architectures.


Seven bold predictions about Android for 2017

The first reason is Google (more on that in a bit). Another reason for this landmark will be a lack of innovation from Apple; the big "A" will continue to play it safe (as they did in 2016), and more users will migrate to Android because of this. Couple this with the increased performance and battery life found in Android 7, and the Linux-driven mobile platform will easily climb the next rung in the global dominance market's ladder. ... Another reason Android will dominate 2017 is the device designed by Google: the Pixel. Not only is this device the most powerful smartphone on the market, it also brings to light features that people will want. One feature in particular is Assistant. Google is the first company to bring an AI-centric digital assistant to life and do it right. With the power of the Pixel driving that feature, this device will continue to be one of the hottest on the market.


Why People and Processes Are Critical to Cybersecurity

“There is so much to consider in cybersecurity, and traditionally, IT in higher education is understaffed,” says Jill Albin-Hill, vice president for information technology and CIO at Dominican University. “It’s tough to find the time and to get the right resources on campus to be able to address it all.” To address that gap, Dominican teamed up with four other small institutions in the western Chicago suburbs — Elmhurst College, North Central College, Wheaton College and Judson University — to create a cybersecurity consortium. The group banded together to contract with an external IT service firm that helps all of the institutions manage cyber risks. ... “Already, it’s helped me gain some visibility across the institution about how this is an important university consideration, and not just an IT issue,” Albin-Hill says.


Top Cybersecurity Lesson from 2016: Unchecked Insiders

It might surprise you, but most organizations struggle to implement and maintain access controls—a basic security building block for file and e-mail systems. Employees and contractors typically have access to far more sensitive data than they need to do their jobs. This makes it much easier for intruders and insiders to do a lot of damage. In the study, 88 percent of end users said their jobs require them to access and use proprietary information such as customer data, contact lists, employee records, financial reports, confidential business documents, or other private or confidential information assets. Sixty-two percent believe they have access to company data they probably shouldn’t see. This, combined with a lack of monitoring and auditing for the files and documents employees do access, sets organizations up for disaster.


Will the cloud be a safe haven for data in 2017?

Delivering enterprise security via the cloud will ultimately start to lower the cost and complexity of the security infrastructure, as those legacy appliance systems are replaced in favor of agile, distributed models, he said.  “There’s a growing call for security to be treated as a fundamentally basic utility where safety can be assumed. The cloud is the key to enabling this, with benefits like storage options, scalability and ease of deployment,” Chasin said. Bluelock CTO Pat O'Day predicts that when faced with a hardware refresh, more companies will turn to the cloud than to new hardware. “There’s a lot of churn in the hardware space because of virtualization. Companies are growing tired of having to refresh their IT systems with new hardware every five years. People want to be more mobile, and the cloud is a way to get there.


Intel's Compute Card mini-computer is so small that you may lose it

At first glance, it's easy to mistake the modular computer for a credit card or smart card. It's so thin, it could be easy to lose. But it's a full blown computer, crammed with a 7th Generation Intel Kaby Lake processor, memory, storage and wireless connectivity. It's so small, it can't accommodate USB-C or other ports to power up or connect to displays. The Compute Card will work only after being plugged into a slot of a larger device, much like smart cards. Here's the bad news: It's not targeted toward PCs. However, we hope Intel will eventually make them for PCs, and there are hints the chipmaker could. The idea of a super-small computer is exciting, and it could solve some problems. For example, computer upgrades could become easier.


The future for APIs - how management and security will have to come of age

The gaps that exist between internal IT teams can lead to issues not being fixed. Research by Ovum pointed to problems here, with 53 percent of respondents stating that the security team should lead on this topic while 47 percent believing that the software development team handling APIs would be responsible. Alongside nailing down the responsibility for these potential problems, this includes managing the response that IT teams should take when there are attacks on their APIs. For internal APIs, the response includes looking at what the attacks are targeting and how to stop the problem. Simply turning an API “off” is one approach; the issue with this is that it stops legitimate traffic from accessing the API as well. Categorising attacker traffic and blocking this from interacting with the API is a more fine-grained approach, but relies on a more intelligent approach to rating requests.


Are we all at risk? Implications of the Oracle-Dyn Merger News

We no longer live in an age when we can outsource our issues, especially when it comes to security. Inspect what you expect. Think about all the moving parts of your ecosystems and inspect those parts. Build layers of redundancy, consider and think about front layers. Do not narrow your thinking to just DDoS attacks, but also DDoS mitigation. Reddit had a good strategy in place when it partnered with Dyn. Without Dyn, it may have been down for days, but Dyn was able to get them back up within hours. Ten years ago, as the CTO of a cloud service provider, prospects used to run us through the security gambit to ensure we had the proper security measures in place to protect their infrastructure they put in our cloud… at the same time AWS, MS and Google were being hit by security incidents and downtime one after the other.


Yahoo breach: a breakdown of the biggest data breach ever

Amichai Shulman, CTO Imperva, explained that, “This Yahoo breach and others before it teach us a couple of things: Attackers are still ahead of enterprises, even the larger companies when it comes to covering their tracks. The alleged breaches were only detected once the leaked information surfaced on the web; and time is still a factor. While the passwords were not leaked in clear text, the time between leakage and detection allowed the attackers, using modern computing power, to crack most of the passwords. If the enterprises had promptly detected the breaches a lot of the potential damage could have been avoided.” “We all can learn from Yahoo!’s misfortune, teaching us how to pre-empt and react to [potential] breaches, because the tools are out there on the market to help. With Yahoo being such a behemoth organisation, the question here is – did they invest in security and, if so, how did it go so wrong?” questioned Alez Cruz-Farmer, VP at NSFOCUS.


Interview with Wesley Coelho on Challenges in DevOps

Once you get there, or not necessarily in sequence, the other interesting thing that people are doing with Agile is you don’t want it just within your organization. You want it across organizations. So if you’re implementing Agile but you are outsourcing a component of your software, for example, to a different organization, you want to eliminate the waterfall communication that’s happening across those organizations. Example of what we’re seeing is a luxury auto manufacturer, who’s developing cars that they sell that run 100 million lines of code. They don’t write any of that code internally. It’s all outsourced to dozens of suppliers. So when they take that car out on the track and they find a defect in the car, they file that defect in their own central repository and they take a technology, an automation technology such as Tasktop, and that gets transformed and automatically transmitted to the right supplier who produced the component where the defect was.



Quote for the day:


"The cure for boredom is curiosity. There is no cure for curiosity." -- Dorothy Parker


Daily Tech Digest - January 05, 2017

Wellcome Trust Sanger Institute Launches Science-as-a-Service

The Sanger Institute wanted to base its Science-as-a-Service offering on open standards and open source technologies, including OpenStack as a private and hybrid cloud infrastructure. The Institute also wanted a partner to help support this infrastructure and one that had experience in building large-scale deployments on a tight timeline, as it wanted this service launch to coincide with the opening of its new research facility. To help address all of these needs, the Sanger Institute turned to Red Hat, the world’s leading provider of open source solutions and one of the largest contributors to the OpenStack project. Built on Red Hat OpenStack Platform, the Institute’s service catalog offers internal users and Wellcome Genome Campus tenants with options of gold, silver and bronze service levels, each offering a different mix of services and applications to help meet unique scientific needs.


Build a data center shutdown procedure to prepare for the worst

Every data center shutdown procedure is a prelude to an eventual restart, so proper preparation is key to ensure successful restarts once an outage period has passed. Create a comprehensive -- or at least current -- documentation set that captures each system's volume, operating system and application configurations, paying special attention to anything that could potentially or unexpectedly change during a reboot. There are countless tools to create this documentation and most modern configuration management and enforcement tools can capture and report system states. Don't forget to capture or record the configuration of any networking equipment or storage arrays. During preparation, also identify and understand the myriad of different dependencies within your data center. Documenting dependencies allows IT staff to reboot systems, services and applications in their proper order to avoid disruption and lost startup time.


A Vendor's Security Reality: Comply Or Good-Bye

This development has prompted government contractors to pursue FISMA compliance or risk exclusion from the federal vendor community. Enforcement of FISMA's third-party standard is being performed primarily through the procurement process, with all prospective vendors required to attest to adherence with rigorous data security controls when responding to a solicitation. The specific language within contract awards mandates that vendors submit evidence of FISMA compliance in the form of monthly, quarterly, and annual deliverables. Accordingly, if your company is doing business with a government agency, you will be required to provide detailed and ongoing evidence of compliance. Additionally, agencies are increasingly deploying audit teams to perform on-site verification of a vendor's control environment.


What is 'Enterprise Ethereum'? Details Emerge on Secret Blockchain Project

So far, the reason for the secrecy appears to be concerns about the competition coming from other sectors of the blockchain industry. But, there's reason to be skeptical about this possible reasoning for the group's launch. Former IBM blockchain developer Henning Diedrich, who left the company last year to work on his own smart contract language, contends that ethereum's software is already suitable for private blockchains that he tested at IBM. However, he noted that the relatively nascent state of enterprise products like Hyperledger and R3CEV's Corda platform may be forcing enterprise interest in a more robust offering from ethereum, a comparatively more tested alternative. Though Diedrich argued that ethereum developers still have room to improve the product, he remains skeptical that a large-scale ethereum consortium is even necessary.


The difference between the Traditional CIO and the Transformational CIO

At the risk of being over-inclusive, every enterprise will need to take the digital transformation journey. Technology is playing a more central role to every enterprise. Put a different way, technology is quickly becoming the strategic weapon for every enterprise. Think of companies that have disrupted different industries. In most cases, technology was central to their ability to disrupt their industry. As part of that journey, every enterprise will need to rely more on a transformational CIO. However, that transition does not happen overnight. Recall that it is not just the CIO that must transition (read: Transforming IT Requires a Three-Legged Race). Transformation, much like culture changes, is a journey. There is no specific end-point or finish line. One could ask, how does a CIO make the transition. For each CIO, the journey is incredibly personal and transformational in their own way.


The Basics of Web Application Security

Before jumping into the nuts and bolts of input and output, it's worth mentioning one of the most crucial underlying principles of security: trust. We have to ask ourselves: do we trust the integrity of request coming in from the user’s browser? (hint: we don’t). Do we trust that upstream services have done the work to make our data clean and safe? (hint: nope). Do we trust the connection between the user’s browser and our application cannot be tampered? (hint: not completely...). Do we trust that the services and data stores we depend on? (hint: we might...) Of course, like security, trust is not binary, and we need to assess our risk tolerance, the criticality of our data, and how much we need to invest to feel comfortable with how we have managed our risk. In order to do that in a disciplined way, we probably need to go through threat and risk modeling processes, but that’s a complicated topic to be addressed in another article.


Why 2017 Will Prove 'Blockchain' Was a Bad Idea

Nobody has really figured out what this DLT chimera is about or which problem it should solve. (Yet, we have been told it could reduce banks' infrastructural costs by $20bn). Even the European Securities Market Authorities (ESMA) wonders about its applicability. The ESMA consultation paper issued in June posed many sensible specific questions: unfortunately most of the answers received were generic rhetoric exercises. Adding insult to injury, even when it comes to derivatives trading and clearing (where ESMA is confident DLT cannot be applied), unfunded claims about interest rate swaps as smart contracts on DLT obfuscate the debate. Last but not least, no DLT proposal has really delved into how to implement cash-on-the-ledger for effective delivery vs payment or, even more crucially, how to reach decentralized consensus.


Eight CIO goals and IT resolutions for 2017

Undoubtedly, all the trends of the digital economy will get a lot of play, and information technology will facilitate the continuation of businesses' transformation. We will see the expansion of the internet of things, smart automation, further increase the proportion of mobile and cloud solutions based on big data solutions, and wider use of deep learning technologies. Special focus will be put on robotics. The value of information security will be more and more enhanced. If we talk about software engineering, the market increasingly requires business expertise, in addition to pure design. Also, the development cycle will become shorter and shorter. Next year will truly be the year of the customer, with companies offering smart technology solutions to delight business users and consumers alike.


Business adoption plans for IoT, AI, VR, and beyond

When examining the adoption of various types of AI, the results show that about one in five organizations use intelligent digital assistants for work-related tasks while relatively fewer reported using machine learning (8 percent) or business analytics with AI (8 percent). Still, more organizations are planning to adopt AI technology over the next five years, with nearly half intending to adopt intelligent assistants, 60 percent planning to adopt machine learning, and 72 percent looking to deploy business analytics with AI. ... "IT professionals are rightly concerned with the practicality of integrating emerging technology in the workplace, particularly when it comes to VR and 3D printing," said Peter Tsai, IT analyst at Spiceworks. "Many organizations are struggling to find viable use cases for VR and 3D printers that will justify the costs."


Data Breaches Through Wearables Put Target Squarely on IoT in 2017

Mike Kelly, CTO of Blue Medora, says, more connected devices will create more data, which has to be securely shared, stored, managed and analyzed. ... Those organizations that can most effectively monitor their database layer to optimize peak performance and resolve bottlenecks will be in a better position to exploit the opportunities the IoT will bring, he says. Lucas Moody, CISO at Palo Alto Networks, says security has to be baked into the IoT devices – not be an afterthought. The bloom of IoT devices has security practitioners in the hot seat, with industry analysts suggesting a possible surge up to 20 billion devices by 2020. “Given the recent upward trend in both frequency and intensity of DDoS attacks of late, 2017 will introduce an entirely new challenge that security teams will need to contend with; how do we secure devices, many of which are by design dumb and, for that matter, cheap?,” he says.



Quote for the day:


"GreatBosses model & demand aligned values & performance DAILY." -- S. Chris Edmonds


Daily Tech Digest - January 03, 2017

How Advanced Analytics Can Shore Up Defenses Against Data Theft

One approach is to implement an unsupervised, machine learning protective shield that delivers a defense layer to fortify IT security across EHR platforms and other hospital IT systems. A self-learning system then would have the flexibility to cast a rapidly scalable safety net across an organization’s information ecosystem, distributed or centralized, local or global, cloud or on-premise. Whether data resides in a large health system or small chain of clinics, rogue users are identified instantly. By applying machine learning techniques across a diverse set of data sources, systems become increasingly intelligent by absorbing more relevant data. These systems can then help optimize the efficiency of hospital security personnel, enabling organizations to more effectively identify threats. 


5 ethics principles big data analysts must follow

"At this point in our history... we can process exabytes of data at lightning speed, which also means we have the potential to make bad decisions far more quickly, efficiently, and with far greater impact than we did in the past." Besides the potential for bad decisions, Etlinger believes that humans place too much faith in technology, including, for example, our blind acceptance of charts and graphs developed from big data analysis. As to what might be done to improve the situation, Etlinger and Jessica Groopman write in their Altimeter report The Trust Imperative: A Framework for Ethical Data Use (PDF) that businesses and organizations building and/or using big-data platforms need to start adhering to ethical principles. To incorporate ethics, Etlinger and Groopman suggest studying The Information Accountability Foundation's (IAF) paper A Unified Ethical Frame for Big Data Analysis, and paying particular attention to the following principles


10 roadmaps to IT career success

If you're considering a career in IT -- or looking to make a career change -- there's no better time than now. With salaries well above average and companies grappling with a talent shortage, you'll be well-compensated and your skills will be in high demand for years to come. Kristine Spence is a digital marketing pioneer whose career has undergone just as much of a digital transformation as the IT industry. Here, she talks about what it takes to be an innovator in the digital marketing arena. ... As organizations struggle to make sense of increasingly large amounts of customer and industry data, data scientists are becoming a must-have role for any IT department. Two data scientists for Kronos explain what it takes to succeed in one of the sexiest careers in IT today.


How technology will transform banking in 2017

Service providers are keen to capitalise on interest in the technology, and are quickly positioning themselves to advise customers that are keen to kick off pilot projects. This has lead to the likes of Capgemini and CGI snapping up blockchain expertise to build out advisory teams. Peter Roe, research director at TechMarketView, said that the blockchain ecosystem will continue to mature next year, with collaboration between smaller fintech startups and better-funded, more established vendors. “Throughout 2017, we should see further major changes to the Blockchain landscape and the emergence of some key players,” he wrote in a blog post. “Although the widespread use of Blockchain is still some way off (not helped by understandable caution in the regulator community), we can still expect plenty of activity.”


Healthcare organizations lag in digital marketing for cybersecurity strategies, study finds

Conceptually, healthcare is pursuing some advanced ideas for marketing, yet the industry’s infrastructure is not ready for many of them, Klein said. For instance, there is a lot of interest among marketing executives to upgrade their organizations’ virtual front door – the website – yet only 46 percent of respondents said their organization provides proper funding for it. And while the majority believe social media is a valuable forum, six out of 10 organizations block employees from using it, he said. The infrastructure and today’s crop of modern digital tools on top of it are an increasingly important element within not just marketing but also cybersecurity strategies. “There must be more attention placed on cybersecurity,” Klein said. “It’s scary out there and it has only begun.”


'Malicious cyber activity' has happened in previous US elections, Obama says

It's still unclear what malicious cyber activity was related to previous elections, and whether Russia was also involved in that activity. But a joint analysis report from the FBI and the U.S. Department of Homeland Security said that the 2016 election activity was part of a decadelong campaign targeting government organizations, critical infrastructure entities, think tanks, universities, political organizations and corporations. The report released on Thursday details two separate Russian groups that intruded on a U.S. political party, one in summer 2015, and a second in spring 2016. Both groups use targeted "phishing" emails and camouflaged their tracks, Thursday's report said. A third attack, likely tied to Russia, was launched in November, just days after the 2016 election, the report said.


Growing the Internet of Things, part 5: Security

Ease of Use is also often a tradeoff with security. Consumers like the simplicity of new keyless entry systems on cars. When you approach the car, it unlocks, and you simply push the start button and drive away. No need to search for keys in your purse or briefcase. However, this consumer ease of use can provide a means for someone to steal the car if they either amplify the keyfob signal when you are away from the car, or if they can hack the security codes in the keyfob itself. Security can also impact Interoperability. If I build a door lock using the same technology and protocols as another connected device, but I require use of an application key and another device does not, we will not interoperate. Security has also been viewed as an interoperability problem because it has not been turned on in devices. 


A potentially fatal blow against patent trolls

The case at issue is Gust vs. Alphacap Ventures and Richard Juarez (some early rulings go into extensive background), and last month’s final ruling came from U.S. District Court Judge Denise Cote. Cote found that patent troll Alphacap had pursued a case against Gust, despite the U.S. Supreme Court ruling that made it clear it couldn’t succeed legally.  “It is highly, highly, highly unusual for counsel to be held directly responsible for these fees,” said Lori Smith, an attorney with the White and Williams law firm that represented Gust, an internet crowdfunding company. “I think it is going to have a significant chilling effect on patent troll litigation. You’re going to see law firms thinking twice before they take on clearly questionable patent litigation.”


Why the earliest open source licenses are still the most relevant

In fact, if we look at how open source licensing has evolved over the last two decades, there has been a dramatic shift away from restrictive licenses like the GPL and toward permissive licenses, which today account for well over 50% of all open source code, while restrictive GPL-style licenses have dwindled to just a third of all code, a percentage that keeps shrinking every year. This trend is particularly pronounced among the GitHub generation, which often hasn't licensed its code at all. All of which brings us back to where we began in open source licensing. We've gone through a period of time when we thought we needed purpose-built licenses for individual projects, but we didn't. We've also thought we needed ever more restrictive ways to protect user freedom but, again, we haven't.


Nine Ways to Protect an Enterprise Against Ransomware

Ransomware infiltrations in enterprises increased by 35 percent in 2016, according to consensus of security industry analysts and vendors, including Symantec. But even more alarming is the recent rise in its sophistication and distribution. Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid. It can bring your business to a halt and cause significant financial damage. Unlike the stealthier advanced attacks that can stay undetected on corporate network for months, the impact of ransomware is immediate and intrusive. Cyber attackers don't need a lot of money, resources or technical sophistication to use ransomware. Businesses are increasingly concerned about monetary damage, business downtime and other effects of ransomware.



Quote for the day:



"It takes ten times as long to put yourself back together as it does to fall apart." -- Suzanne Collins

Daily Tech Digest - January 02, 2017

Cognitive on Cloud

Referred to as “Cognitive on cloud”, this model delivers cognitive services running in the cloud that are consumable via representational state transfer (REST) APIs. These services are available as part of platform-as-a-service (PaaS) offerings such as Bluemix and can be easily bound to an application while coding. Using this approach, cognitive analytics such as voice (tone analyzer, speech-to-text) and video (face detection, visual recognition) capabilities enables quick analysis of petabytes of unstructured data. Developing cognitive applications to run on mobile devices has provided new insights which help organizations create totally new revenue streams. When selecting a cloud service provider however cognitive on cloud ROI requires more than just a total cost of ownership comparison. In addition to this basic analysis, an organization must consider which cloud is cognitive enabled at the Platform-as-a-Service (PaaS) layer.


High versus low-level data science

Access to highly granular (low-level) data was not easy to get, and dashboard summaries, carefully selected and crafted, were sufficient to detect and address the issue with a one-week turnaround, doing a number of tests described in the next section. More specifically, we used the Google Analytic dashboard. We did not access granular metrics such as IP address, detailed log-file transactions, or summary statistics broken down by user agent / referral combinations (not available from the dashboard). But we did use session duration, number of pages, and conversions, per day per referral, probing the summary data sometimes 2-3 times per day to check the results of a number of tests and fine-tuning, in short to check and quantify impact on performance. Performance here is measured as the number of real (not bogus) conversions per click, or conversion rate.


IT pro's revitalization guide 2017

IT pro's 2017 revitalization guide Before 2017 comes at us hard, take a moment to restock your your intellectual reserves with our most insightful tech-management articles and videos. No matter how long you've been in IT, it's always a good idea to pause periodically and take stock of your professional and personal progress. Why not take a few moments to read through the best of Computerworld's management and career coverage? Scroll down to browse the complete list or click a link to skip directly to your chosen topic. ... Many IT professionals say they would go all-out to land the best jobs, with the best benefits at the best companies. All it takes is up-to-the-minute skills and a whole lot of drive. ... You’re killing it at work, but does anyone notice? A large percentage of IT professionals say the answer is no.


4 information security threats that will dominate 2017

"The pace and scale of information security threats continues to accelerate, endangering the integrity and reputation of trusted organizations," Durbin says. "In 2017, we will see increased sophistication in the threat landscape with threats being tailored to their target's weak spots or threats mutating to take account of defenses that have been put in place. Cyberspace is the land of opportunity for hacktivists, terrorists and criminals motivated to wreak havoc, commit fraud, steal information or take down corporations and governments. The solution is to prepare for the unknown with an informed threat outlook. Better preparation will provide organizations of all sizes with the flexibility to withstand unexpected, high-impact security events." The top four threats identified by the ISF are not mutually exclusive. They can combine to create even greater threat profiles.


Artificial intelligence takes on machine reading

Artificial intelligence (AI) made incredible strides in 2016, and the growth appears set to accelerate as we enter the New Year. A team of Microsoft researchers has released a dataset of 100,000 questions and answers that other AI researchers can use – for free – in their quest to create systems that can read and answer questions as well as a human. The MS MARCO dataset is based on anonymized real-world data from Bing and Cortana queries and is part of an attempt to spur the breakthroughs in machine reading that are already happening in image and speech recognition. The move is also aimed at facilitating advances toward “artificial general intelligence,” or machines that can think like humans – and can read and understand a document as well as a person.


The First Quantum Revolution: Foundational information for the enterprise CTO

Quantum physics helped us understand the periodic table, chemical interactions, and electronic wave functions that underpin the electronic semiconductor physics. In fact, there are many devices available today which are fundamentally reliant on our understanding the effects of quantum mechanics. These include the transistor, lasers, GPS, semi-conductor devices and MRI imagers. These devices are often referred to as belonging to the 'first quantum revolution’. What’s amazing is that within one silicon chip there are about 3 billion transistors, enabled by the progress of this first quantum revolution. And they all have to work reliably so that your computer, your mobile phone or whatever you have actually works. Now that’s quite amazing. Just think about that now. If you look around you now, we all carry around our personal electronics.


Hands On: DELL Twists The XPS 13 Into a 2-In-1

Dell claims the battery life of the XPS 13 2-in-1 ranges from nine to 15 hours, depending on how you use it. The battery life goes up if you're doing basic productivity work and declines to around nine hours if you are watching Netflix movies. The XPS 13 2-in-1 is a step down in performance compared to the XPS 13 laptop, but the decline is not visible when running basic applications or graphics. The device has a 7th Generation Intel Core i5-7Y54 or Core i7-7Y75 processor, which aren't as speedy as the mainstream Kaby Lake-based Core i3, i5, and i7 processors offered in the XPS 13 laptop. An Intel integrated GPU can support 4K graphics play-back on external displays. Dell went with the Y-series Kaby Lake chips so the XPS 13 2-in-1 can provide long battery life, compared to tablets today.


Privacy is still alive and kicking in the digital age

With the current digital infrastructure, we are heading in the wrong direction: Individuals are becoming more and more transparent, open to different types of control, manipulation and discrimination, while the powerful — government, industry and organizations — are more and more closed off. Freedom, individual independence and democracy are fundamental reasons why the individual right to privacy is something we should all care about. Privacy is a universal human right penned in international conventions, declarations and charters that were formalized at a time in history when private life was the default. There were clear lines and limits between private homes and public streets and buildings, between a private person and the public authorities and spaces. It was the letter in the sealed envelope.


Hackers will grow increasingly bold in 2017

Nothing is safe. Not your email, your personal information, your photos, your files. If it’s stored online, it’s theoretically accessible to anyone with the skills and wherewithal to grab it. According to the Identity Theft Resource Center, nearly 900 million records might have been accessed in almost 7,000 known data breaches since 2005. The actual number of breaches is undoubtedly higher because not all security lapses are publicized. A few weeks ago, Yahoo reported what is believed to be the single largest security breach ever — 1 billion user accounts potentially accessed in August 2013. Yahoo said it only discovered the incident recently, which does little to ease concerns. The attack apparently was unrelated to a separate breach in 2014 involving 500 million accounts, which Yahoo revealed in September. The company blamed that one on an unnamed foreign government.


Mitigating internal risk: Three steps to educate employees

When employees first start it’s important to give them a list of the top 10 rules they should follow regarding IT practices. If you know the rules that are violated the most, it’s suggested that those should make the top of your list. If you don’t then a good way to find out is to use monitoring techniques that will help you to collect this data. There’s a high chance you’ll be surprised by the type of rules people violate. Some examples of no-no’s can include attaching company files to personal e-mails, putting data on non-encrypted USBs, uploading files to cloud drives etc. Yearly training and reminding sessions should also be implemented as a part of company strategy. One of the most effective tactics is to inform users that they are violating policies while they’re attempting to take the action.



Quote for the day:


"A clear rejection is always better than a fake promise. Move on, next "-- @stephenodonnell


Daily Tech Digest - January 01, 2017

7 IT Recruiting Predictions For 2017

In 2016, recruiters grappled with an evolving job market, an incredibly competitive hiring landscape, a shortage of IT talent and sky-high salaries for in-demand roles. Those trends are likely to continue into 2017 as recruiters continue to adapt to the this high-demand, low supply hiring landscape, says Dave Morgan ... "We're very optimistic about what 2017 will hold. We don't see the IT market slowing down at all -- we saw a slight tick downward in the fall, but that demand has picked back up along with the urgency from clients around that demand," Morgan says. The three hottest areas of demand are around security, big data and cloud technologies, Morgan says, as incidents like December 2016's Yahoo breach dominate headlines, organizations struggle to manage and make sense of a tsunami of data and leverage the cloud for more efficient, cost-effective computing power.


IoT, mobility, big data, analytics and imaging intelligence to impact healthcare in 2017

The next generation hospital management system is a long term transformation plan for a three years’ horizon. ... But we are trying to see how we can stage it into two phases, so the phase one can be done by 2017 end and second phase by 2018. So we are trying to make sure we stay focused because beyond three years, you kind of lose oversight on it, then the project becomes really unviable. That’s the first priority we are holding to ourselves. On the cyber security side with the recent ransomware kind of news coming in, where patient records have been attacked by hackers and rasonware, etc., and since we are also moving towards web managing mode with payment gateways for websites and patient related portal which will have patients medical records, hence we thought that we should be upfront from cyber security stand point rather than the post-mortem effect. So that is becoming core in our focus area.


AngularJS vs. React: Two JavaScript Technologies & How to Use Them

React shines when you have lots of dynamic content changing within the view. Most client-side solutions on the web today struggle with rendering large lists of items within a single view. This “struggle” may be on the order of milliseconds, but in this increasingly digital world, a half a second delay is all it takes to kill your user experience. It’s why sites that have a lot of dynamic, constantly changing, data-intensive content like Instagram or Facebook choose to power their applications with React. As a library, you can also use React as the view component of AngularJS or other frameworks, because it does not tie you to a specific technology stack. That said, there’s a quickly growing community and a number of existing libraries and add-ons that can help you build an app from scratch.


Big Data, Big Self-Service

Data self-service became much more prevalent. It is not entirely trivial to organize. Best practices demand that effective access management security, and where necessary, encryption, is in place. There may also be a need for metadata capture software and data cleansing software. However, the pay-off is significant. The main dynamic of this is that the user no longer needs to go cap-in-hand to some IT developer to get access to data. In most organizations, there are limits to what can be held in a data warehouse and there may even be onerous procedures for getting at that data. To add new data sources to the data warehouse would often be prohibitive. The difference with a data lake can be startling. The data lake is, or should be, a single staging area for new data within the organization. It is extensible.


Information architecture: The key to governance, integration and automation

To develop a successful information architecture and meaningful insights, we need to enforce collaboration across business units, IT, the CDO office and other parts of the organization. And perhaps more importantly, we need to change the culture to get people thinking of how new technologies help eliminate all the barriers and create an environment in which everything is automated and transparent. Thinking about information taxonomy and classification isn’t necessary. Tools are just the tools, and we will continue to live in the past without proper collaboration, information sharing, knowledge base building and adoption of a new way of thinking about information. Technology is enablement; people need to understand, change the processes and do so using technology’s help.


Want to make better decisions? Break down the wall between data and IT

There is a lot of hype around the deficit of data scientists for hire, but I believe that you do not need an army of data scientists to make meaningful discoveries. With the tools and systems available today, it is possible for even one or two talented, motivated data scientists to create game-changing innovation. The key is to hire carefully, looking for strong training in quantitative disciplines (pick your favorite, it really does not matter), allied with the mindset of a restless tinkerer.  As a leader, I try to cultivate growth, autonomy, and teamwork throughout the company. This allows the company and data team to attract talent that wants to work with us and who has the same goals in mind. As a company, we aren’t just looking for people who have a degree in analytics or experience in the field. In fact, we have over 30 different graduate degrees on our team.


Using data science for predictive maintenance

Early identification of these potential issues helps organizations deploy maintenance team more cost effectively and maximize parts/equipment up-time. All the critical factors that help to predict failure, may be deeply buried in structured data like equipment year, make, model, warranty details etc and unstructured data covering millions of log entries, sensor data, error messages, odometer reading, speed, engine temperature, engine torque, acceleration and repair & maintenance reports. Predictive maintenance, a technique to predict when an in-service machine will fail so that maintenance can be planned in advance, encompasses failure prediction, failure diagnosis, failure type classification, and recommendation of maintenance actions after failure.


Ooutsourcing Trends To Watch in 2017

This year, we saw outsourcing integration challenges multiply, production workloads and enterprise systems hit the cloud, and security hit the top of the agenda. So what’s ahead for 2017? Uncertainty for one thing. Industry watchers expect a number of shifts in the IT and business process services space — not least of which will be the initiation of more flexible outsourcing terms as the world watches and waits to see what happens once president elect Donald Trump takes office and Brexit takes hold. We also expect to witness maturation in cloud computing, robotic process automation (RPA), and cognitive capabilities while entities like the call center and business models based solely on labor arbitrage fade into history.


How to Use AOP in C# with NConcern .NET

Most AOP frameworks require compromises due to technical limitations (changes needed in the source code, changes in the compilation or deployment process). Few of them are simple to handle and the coupling with the framework is often too strong. This is one of the reasons why too few people are interested in aspect-oriented programming. However, the application of the concepts of aspect-oriented programming is very simple provided they are well understood and have the right tools. This is why I would like to share with you a basic AOP scenario using NConcern .NET, a dedicated open source framework (under MIT licence)


Java Performance Mythbusters

The JVM can be more aggressive in its optimizations through its knowledge of exactly which classes are loaded at any point in time. Even the problem of application warmup can be alleviated with technologies like Azul’s Zing ReadyNow!, which stores a profile of an application during execution. At startup, the profile can be used to substantially reduce the time required to analyze and compile frequently used sections of code. The problem is that some people still believe Java works the way it did twenty years ago when looking at Java performance. One of my colleagues, when I was at Sun, had an excellent way to illustrate this. When talking to people with Java performance problems his approach was something like this



Quote for the day:


“The secret to a rich life is to have more beginnings than endings.” -- Dave Weinbaum